Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
US charges East European cyber virus gang
by Staff Writers
New York (AFP) Jan 23, 2013


Steady rise in government data requests: Google
San Francisco (AFP) Jan 23, 2013 - Google on Wednesday reported a "steady increase" in government requests to hand over data from Internet users in the second half of 2012.

The Web giant's semiannual "transparency report" showed the most requests came from the the United States, with 8,438 requests for information about 14,868 users.

India was second with 2,431 requests for data about 4,106 users, followed by France, where Google received 1,693 requests for information about 2,063 users. Germany, Britain and Brazil rounded out the top six, Google said.

"The steady increase in government requests for our users' data continued in the second half of 2012, as usage of our services continued to grow," said Richard Salgado, Google's head of law enforcement and information security.

"User data requests of all kinds have increased by more than 70 percent since 2009," he said in a blog posting.

"In total, we received 21,389 requests for information about 33,634 users from July through December 2012."

Google said it supplied at least some of the requested data in 68 percent of cases, down from 76 percent in late 2010.

In releasing details of requests in the United States, Google said 68 percent of the requests it received from government entities were through subpoenas, which "are the easiest to get because they typically don't involve judges," according to Salgado.

Another 22 percent were through search warrants, mostly issued by judges when there is "probable cause" related to a crime.

Google provided at least some data in 90 percent of the requests in the United States in late 2012, compared with 94 percent two years earlier.

Berin Szoka of the Washington think tank TechFreedom said the report shows "a disturbing growth in government surveillance online."

"On its own, the growth in number of requests for private information like emails should be alarming, especially after the Petraeus case," he said, referring to the disclosure of email exchanges that led to the resignation of CIA director David Petraeus.

"Even more disturbing is that most requests have not been reviewed by a court to ensure that law enforcement has established probable cause to believe a crime has actually been committed, as the (constitution's) Fourth Amendment generally requires."

The United States on Wednesday charged three young East European men with running an international cyber theft ring that broke into a million computers, including at the space agency NASA.

The trio used a malicious computer code or malware, dubbed the Gozi Virus, to infiltrate computers across Europe, then America, causing "millions in losses by, among other things, stealing online banking credentials," the federal prosecutor's office said.

The alleged designer and "chief architect" of the virus, Russian national Nikita Kuzmin, was detained on US soil back in 2010 and pleaded guilty the following year, agreeing to cooperate with investigators.

The 25-year-old's alleged partners were nabbed at the end of 2012.

Deniss Calovskis, known as "Miami," 27, was arrested in his native Latvia in November, and charged with writing some of the computer code in the Gozi Virus.

Mihai Ionut Paunescu, nicknamed "Virus," was charged with running a so-called "bulletproof hosting" service that enabled distribution of the Gozi and other viruses. Paunescu, 28, was arrested in his home country of Romania in December.

FBI Assistant Director-in-Charge George Venizelos said: "This long-term investigation uncovered an alleged international cybercrime ring whose far-reaching schemes infected at least one million computers worldwide and 40,000 in the US, and resulted in the theft or loss of tens of millions of dollars."

Manhattan chief federal prosecutor Preet Bharara likened the alleged gang to the notorious American bank robber William "Willie" Sutton. But, he added, "as we have seen with increasing frequency, cyber criminals' bank heists require neither a mask nor a gun, just a clever program and an Internet connection.

"This case should serve as a wake-up call to banks and consumers alike, because cybercrime remains one of the greatest threats we face, and it is not going away any time soon."

Prosecutors say the ultra sophisticated scam unfolded between 2005 and March 2012 and that the virus was "virtually undetectable in the computers it infected." First, it was implanted in computers across Europe "on a vast scale," then around 2010 it spread to the United States, the Calovskis indictment said.

In the United States, "more than 160 were computers belonging to the National Aeronautics and Space Administration (NASA)," the indictment said.

Financial losses caused by the Gozi Virus hit "at a minimum, millions of dollars," the indictment said.

The FBI worked with Britain, Finland, Germany, the Netherlands, Latvia, Moldova, Romania and Switzerland over a two-and-a-half year period, seizing 51 servers in Romania alone, and 250 terabytes of information.

Paunescu operated what's known as a "bulletproof hosting" service that allows cyber criminals to operate beyond the reach of law enforcement, the indictment against him says.

The Romanian would rent thieves safe IP addresses and servers which were then used to spread malware, including the Gozi Virus, the Zeus Trojan and SpyeEye Trojan, the charges said.

Collectively, these viruses "have infected millions of computers around the world, targeted numerous banks in the United States and elsewhere, including at least one major United States bank headquartered in Manhattan," the indictment said.

Kuzmin, the indictment against him says, "hired a sophisticated computer programmer to write the virus' source code" for the Gozi, so that he could embark on large-scale theft.

"After months of work, (the unnamed programmer) completed work on the source code for the Gozi Virus and provided it to Kuzmin," who in turn rented the virus out to other criminals, the indictment says.

These co-conspirators were enabled to tailor the Gozi Virus to their own goals, whether for stealing passwords or other data. Kuzmin allegedly called this business the "76 Service."

Calovskis, the Latvian, was described as having used his expertise in computer programming to create "web injects," a code that alters how banking websites appear on infected computers, prompting victims into revealing more personal information, such as Social Security numbers.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Russian cyberlab discovers new virus
Moscow (UPI) Jan 17, 2013
Russia's Kaspersky Labs has uncovered the "Red October" computer virus, used for cyberespionage. Kaspersky Labs said the Red October malware has been trolling the Internet for the past five years, targeting sensitive information from government departments and major companies worldwide in more than a dozen nations. According to Kaspersky Lab, the ultimate manager of the Red Octob ... read more


CYBER WARS
NATO Patriot missiles operational in Turkey at weekend

Israel upgrades missile-killer Iron Dome

Protest in Ankara against Patriot missile deployment

German, Dutch Patriot missiles arrive in Turkey: NATO

CYBER WARS
Raytheon awarded contract for HARM upgrade

Short-range ballistic missile again fired in Syria: NATO

Iran develops new missile launcher

Thatcher 'warned France to cut off Exocets in Falklands war'

CYBER WARS
Sagetech, ING Robotic Aviation Demonstrate "Sense and Avoid" Capabilities of UAV's

Northrop Grumman, Cassidian Fly First Sensor-Equipped Euro Hawk

TerraLuma Selects Headwall's Micro Hyperspec for UAV Applications

Elbit Systems to Supply Long-Range Observation Systems to the Israeli Ministry of Defense

CYBER WARS
Insights from the SIA DoD Commercial SATCOM Users' Workshop

Boeing to Upgrade Combat Survivor Evader Locator Radios, Base Stations

NATO member orders Falcon III radios

Lockheed Martin Completes Work on US Navy's Second MUOS Satellite

CYBER WARS
Raytheon, USAF complete Small Diameter Bomb II fit check on F-35 aircraft

Lockheed Martin Receives USAF Approval For Sniper Pod Full-Rate Production Under ATP-SE Program

Operators use JLENS for IED warfare simulation

Northrop Grumman to Provide Hand Held Precision Targeting Devices to US Army

CYBER WARS
Britain to axe up to 5,300 army jobs

US military to lift ban on women in combat

India and Israel deepen defense ties

Rheinmetall wins 280 mn euros in contracts in Kuwait, Asia

CYBER WARS
Japanese PM holds out olive branch to China

Russia ready for seeking a compromise with NATO on air defense

Obama issues inaugural call for unity, equality

Outside View: What Obama can learn

CYBER WARS
New Research Gives Insight into Graphene Grain Boundaries

Chemistry resolves toxic concerns about carbon nanotubes

Engineer making rechargeable batteries with layered nanomaterials

New nanotech fiber: Robust handling, shocking performance




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement